نتایج جستجو برای: mobile biometrics
تعداد نتایج: 178825 فیلتر نتایج به سال:
From the INS to ATM’s, both the public and private sectors are making extensive use of biometrics for human recognition. As this technology becomes more economically viable and technically perfected, and thus more commonplace, the field of biometrics will spark legal and policy concerns. Critics inevitably compare biometrics to Big Brother and the loss of individual privacy. The probiometric lo...
Different types of biometrics are currently available in the market, and are widely used in various security applications. Biometrics can be classified into two categories, “physiological biometrics” and “behavioral biometrics”. Physiological biometrics identify the user based on physiological characteristics, such as fingerprints and eye retina/iris scanning, whereas behavioral biometrics depe...
This manuscript presents the design of a new approach human skin color authentication. Skin is one most popular soft biometric modalities. Since modality alone cannot reliably authenticate an individual, this system designed to combine results with other pure modalities increase recognition performance. In classification process, we first perform facial detection by segmentation using threshold...
Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communicat ion and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been exp lored in which b i...
Nine rising stars in software engineering shared their perspectives on the future of software engineering at the Leaders of Tomorrow Symposium at the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering. Here they describe how software engineering research will evolve, highlighting emerging opportunities and groundbreaking solutions. They predict the rise of end...
Received May10 th , 2013 Revised Jun 30 th , 2013 Accepted Jul 26 th , 2013 Cloud computing supports mobile and collaborative applications and services. Increased storage, high automation, flexibility, and reduced cost are a few advantages cloud computing offers. Using cloud computing can improve healthcare services delivery for patients. In this paper, the categories and service models of clou...
In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage of this device is illustrated by a number of examples. The hardware and software components are presented. Particular, we compare Bluetooth and Infrared (IrDA) wireless networking technology, explain the usage of biome...
In view of the fact that biological characteristics have excellent independent distinguishing characteristics,biometric identification technology involves almost all the relevant areas of human distinction. Fingerprints, iris, face, voice-print and other biological features have been widely used in the public security departments to detect detection, mobile equipment unlock, target tracking and...
With the ongoing digitalisation of our everyday tasks, more and more eGovernment services make it possible for citizens to take care of their administrative obligations online. This type of services requires a certain assurance level for user authentication. To meet these requirements, a digital identity issued to the citizen is essential. Nowadays, due to the widespread use of smartphones, mob...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید